Keeping your access tokens secure can be extremely important to help protect your sensitive data. Below are some handy tips to help keep your access tokens secure.
Note: This functionality is in beta. Contact your CSM or our support team if you'd like to test this feature.

Ensure that your credentials are only ever shared in a secure manner, with authorized individuals.
Store your credentials securely in a location that is inaccessible to unauthorized users or applications.
Encrypt your credentials both at rest
and in transit
to add an additional layer of security.
You should rotate your credentials on a recurring basis by resetting the access token and updating your integrations to use the new credentials.
Only grant the scopes required for the token's purpose when creating an access token. Restricting an access token's scope will help to reduce the potential damage if the token is compromised.
When you enable an access token, you should also reset it and update all integrations to use the new token's credentials. This will ensure that any possibly compromised credentials will no longer be valid for that token.
If you suspect a token is compromised, reset the access token. This will immediately remove all access to unauthorized actors. Next, update all of your integrations to use the new credentials.
If an access token is no longer required, disable or delete it. This will take effect immediately.